An ntru secure access method for power internet of things network terminals based on edge computing

An IoT network and edge computing technology, applied in the field of communications, can solve problems such as low point multiplication operation efficiency, Shor algorithm cracking, and poor resistance to quantum attacks.

Active Publication Date: 2022-05-31
ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID NINGXIA ELECTRIC POWER COMPANY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the coexistence of multiple protocols in the power Internet of Things, the diversity of data sources and data types makes the security of the core system network layer of the power Internet of Things face great challenges.
Elliptic Curve Cryptography ECC (Elliptic Curve Cryptography) algorithm, which is commonly used in IoT authentication, has low efficiency of dot multiplication, poor ability to resist quantum attacks, and is easily cracked by Shor's algorithm.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An ntru secure access method for power internet of things network terminals based on edge computing
  • An ntru secure access method for power internet of things network terminals based on edge computing
  • An ntru secure access method for power internet of things network terminals based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the accompanying drawings. However, it should be noted that these implementations are not

[0050] FIG. 2 is a specific flow of the safe access of terminal equipment in the power Internet of Things network. NB‑IoT and eMTC devices via mobile

[0051] FIG. 3 is a network security access protocol for the power Internet of Things using edge computing. In this agreement, the system HSS service

[0055] This protocol is used in the terminal equipment D of the power Internet of Things network.

[0056] A method for secure access to a network terminal NTRU based on edge computing, comprising the steps of:

[0057] Step 1: initialization. The main architecture of the system is: power IoT network terminal equipment D

[0058]

[0059]

[0060]

[0061]

[0063] The NTRU algorithm works on ring R:

[0065] The multiplication operation on the ring R is represented by *. For example, the polynomial H=F*G can b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the field of communication, an NTRU secure access method for an electric power Internet of Things network terminal based on edge computing, in the initialization stage, the system HSS server issues data information required for complete authentication. When the power Internet of Things network terminal device needs to initiate communication, it needs to send authentication information to the edge computing MME server. After receiving the information, the edge computing MME server judges whether the access of the power Internet of Things network terminal device is legal through calculation and comparison, and then returns the authentication information. After receiving the authentication information of the edge computing MME server, the terminal device of the power Internet of things network compares the local information with it. If the comparison is successful, an encrypted secure channel between the terminal device of the power Internet of Things network and the edge computing MME server is established.

Description

Secure access method of power IoT network terminal NTRU based on edge computing technical field The present invention relates to communication field, be specifically related to a kind of power network terminal NTRU security based on edge computing access method. Background technique The essence of the power Internet of things is the connection and interaction of information, which has the characteristics of data diversification, large amount of data and complex data structure. Features. Due to the coexistence of multiple protocols in the power Internet of Things, the diversity of data sources and data types makes power The security of the network layer of the core system of the Internet of Things faces enormous challenges. The elliptic curve cryptography ECC commonly used in IoT authentication (Elliptic Curve Cryptography) algorithm has low point multiplication operation efficiency, poor resistance to quantum attacks, and is easily affected by Shor algorithm crac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/08H04L63/0428H04L63/1458H04L63/02H04L9/085Y04S40/20
Inventor 李兴华李晓龙王峰闫振华段文奇朱东歌
Owner ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID NINGXIA ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products